Static task
static1
Behavioral task
behavioral1
Sample
25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25830caee95d594b6d437d8ac3b84f10_JaffaCakes118
-
Size
360KB
-
MD5
25830caee95d594b6d437d8ac3b84f10
-
SHA1
260a6dd4b44662c2da6fe5e0650a3561f6f13a04
-
SHA256
453da6955c691ed6adb47715e129a11f3b2f6dea826d4c815ae42fdfaa14db36
-
SHA512
eec5877fb6aab513bd3f001c0955bf0c68b1f34cf655cc8dc0be96e6b2bce496c126e0a3d473ae5b4a347810536a942c068c22ec0290616ca62a5b1071bb7e83
-
SSDEEP
6144:B8xwFE5KW6gjcdSW1vrG5qD1JTHReDMZT:BHzDdSyi5e5Rw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25830caee95d594b6d437d8ac3b84f10_JaffaCakes118
Files
-
25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca71c19f759ed23f0af0890db640a60c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDefaultUILanguage
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsDBCSLeadByte
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
GetModuleFileNameW
MapViewOfFile
MoveFileExW
MoveFileW
MultiByteToWideChar
OpenEventW
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
ReadFile
RemoveDirectoryW
ResumeThread
RtlUnwind
SearchPathW
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrcmpW
lstrcmpiA
lstrlenA
lstrlenW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
FreeLibrary
FlushFileBuffers
FindResourceW
FindResourceExW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
EnumUILanguagesW
EnterCriticalSection
DisableThreadLibraryCalls
DeleteFileW
DeleteCriticalSection
CreateThread
CreateFileW
CreateFileMappingW
CreateDirectoryW
CopyFileW
CompareStringW
CompareStringA
LockResource
CloseHandle
user32
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
SendDlgItemMessageW
SendMessageTimeoutW
SetCursor
SetTimer
TranslateMessage
LoadStringW
LoadCursorW
KillTimer
GetWindow
GetTopWindow
GetSystemMetrics
GetMessageW
GetClassNameA
EndDialog
DispatchMessageW
DialogBoxParamW
DestroyIcon
CharNextW
CharLowerW
LoadImageW
advapi32
RegOpenKeyExW
EnumServicesStatusExW
DuplicateTokenEx
CreateProcessAsUserW
CopySid
ConvertStringSidToSidW
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSaveKeyW
RegSetValueExW
RevertToSelf
SetFileSecurityW
SetSecurityDescriptorOwner
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeSecurityDescriptor
LookupPrivilegeNameW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegOpenKeyExA
FreeSid
shlwapi
StrTrimW
StrToIntW
StrToIntExW
StrStrW
ChrCmpIA
PathAddBackslashW
PathAddExtensionW
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathFindNextComponentW
PathGetCharTypeW
PathGetDriveNumberW
PathIsDirectoryW
PathIsFileSpecW
PathIsPrefixW
PathIsRootW
PathIsUNCServerW
PathIsURLW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathRenameExtensionW
PathSkipRootW
PathUnquoteSpacesW
SHDeleteEmptyKeyW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
StrStrIW
SHSetValueW
StrChrIW
StrChrW
StrCmpIW
StrCmpNIW
StrCmpNW
StrCmpW
StrDupW
StrRChrW
StrRetToStrW
StrSpnW
SHQueryValueExW
ole32
StringFromGUID2
CreateBindCtx
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoCreateInstance
CoCreateGuid
oleaut32
SysStringByteLen
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysFreeString
shell32
SHGetDesktopFolder
ShellExecuteExW
SHChangeNotify
setupapi
SetupCloseInfFile
SetupFindFirstLineW
SetupFindNextLine
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetStringFieldW
SetupOpenInfFileW
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE